Group
  • Home
  • Posts
  • Support
  • LinkedIn
  • Q&A

Exploitation

Exploiting Stuff
Ghosted.

Ghosted.

Ghosted Domains coming to haunt you, one more check for your scanners, vendor assurance, OSINT, Supply chain, Appsec and all the rest of that good stuff.

Read more
Files, Folders & Fun (revisited)

Files, Folders & Fun (revisited)

Playing with folder resolution to build a better pretext

Read more
Identity Inheritance via expired domains

Identity Inheritance via expired domains

I wonder if any of these leaked email address domains are expired, and I wonder if I can buy them and inherit the identities associated with them via password resets

Read more
'ExpLoading'

'ExpLoading'

If you have ever dismissed a search order binary plant attack because the folder from where it takes place doesn’t allow for writes without elevation?

Read more
Active Directory Network Agents and not-good deployments

Active Directory Network Agents and not-good deployments

That’s a Nice Palo-Alto Firewall Forescout Active Directory Integrated Network Appliance you have ther

Read more
Group

Emergency Cyber Security Support

The Contractor 🏴‍☠️🧯 © 2025

Connect

Twitter
@thecontractorio
Bluesky
@thecontractorio
Threads
@yosignals
LinkedIn
JC

Pages

  • Support
  • Posts
  • Q&A

Topics

  • OSINT
  • Defence
  • Appsec
  • Entsec
  • Infosec
  • Offsec
  • Exploitation
  • Privacy
  • Random
  • Ideas
  • Archive